Preferred Language
Articles
/
ijs-156
Inversion to density and velocity model by integrated with wells data at regional area (central and southwestern Iraq)
...Show More Authors

A new derivative applied to the old gravity Bouguer map (served in 1940s and 1950s), taking regional study area covered the mid and south of Iraq. The gravity anomaly reflects a density contrast variation; therefore it is possible to use gravity inversion to the density and velocity model through layers (615m, 1100m, 1910m, 2750m and 5290m), the depth layers according to the power spectrum analysis of gravity Bouguer. The inversion is according to the integration of gravity anomalies of the each depth layer with the same depth of wells data, considered to the estimations and analysis of density and velocity scatters of the oil wells distribution with depth at the regional area. Taking the relation curve of density and velocity by presenting the function of (8 logs), which obtained the main relation to Seismic velocity and density of the study area, which is confirm with (Nafe and Drake curve). The result of the gravity inversion is on the anomalies behavior in density and velocity domain, taking in seismic stack processing of seismic reflection records and time to depth conversion, as the geophysical integration data is addition to the well data distribution in the regional area of Iraq. Good results obtained on comparing the interpretation of the considered seismic section in the study area.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Semi-Essential Submodules
...Show More Authors

Let R be a commutative ring with identity and let M be a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of semi-essential submodules which introduced by Ali S. Mijbass and Nada K. Abdullah, and we make simple changes to the definition relate with the zero submodule, so we say that a submodule N of an R-module M is called semi-essential, if whenever N ∩ P = (0), then P = (0) for each prime submodule P of M. Various properties of semi-essential submodules are considered.

View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تحليل فاعلية الشمول المالي لمعالجة الفقر في العراق مع إشارة الى التجربة النيجيرية
...Show More Authors

The focus of this research lies in the definition of an important aspect of financial development, which is reflected on the alleviation of poverty in Iraq, namely financial inclusion and then taking the path of achieving a sustainable economy, certainly after reviewing one of the important international experiences in this regard and finally measuring the level of financial inclusion in Iraq and its impact on poverty reduction through the absolute poverty line indicator.

View Publication Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Investigation of Aerial Parts of Iraqi Cardaria draba
...Show More Authors

 The aim of this study was to study chemical constituents of aerial parts of Cardaria draba since no phytochemical investigation had been studied before in Iraq. Aerial parts of Cardaria draba were defatted by maceration in hexane for 72 h. The defatted plant materials were extracted using Soxhlet apparatus, the aqueous Methanol 90% as a solvent extraction for 18 h, and fractionated with petroleum ether- chloroform (CHCl3)- ethylacetate- and n-butanol respectivly. The ethyl acetate, n-butanol, and n-butanol after hydrolysis fractions were investigated by high performance liquid chromatography (HPLC) and thin-layer chromatography (TLC) for its phenolic acid and flavonoid contents. Flavono

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding pro

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Evaluation of Chitosan-Alginate Nanoparticle as A Stable Antibacterial Formula in Biological Fluids
...Show More Authors

      This research mainly focuses on the preparation of chitosan-alginate Nanoparticle by ionotropic gelation method using calcium chloride and sodium alginate to form nanocomposites of CH-ALg, examine their antibacterial activity against multidrug resistance (MDR) bacteria, and evaluate the stability of chitosan-alginate formula in different biological fluids, including simulated gastric fluid (SGF) and intestinal fluid (SIF). The average diameter of particles size prepared was measured by an Atomic force microscope (AFM) and it was 61.91 nm. Otherwise, the nature of functional groups present in CH-ALg nanoparticle was investigated by Fourier transforms infrared (FTIR) analysis. The stability of synthesized CH-ALg nanoparticle was

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
De-Noising of Corrupted Fluoroscopy Images Based on a New Multi-Line Algorithm
...Show More Authors

 Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of knowledge assimilation on strategic clarity - an exploratory study in the Iraqi Ministry of Transport - Iraqi Airways Company*
...Show More Authors

 

The research aims to build an integrated frame of knowledge for the basic research topics, represented by (assimilation of knowledge, strategic clarity) and their basic variables, by examining the most important scientific propositions on these topics in administrative thought, and framing the knowledge contained in them, in a serious attempt to provide appropriate answers to questions The research dilemma, and the research was applied in the Iraqi Airways Company, whose number is (1200) employees, and the descriptive and analytical approach was adopted in conducting the research. A valid form for statistical analysis, i.e., with a retrieval rate of (92%). The two researchers used the (SPSS & AMOS) program for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
The Prohibition of Perfidy in International Humanitarian Law
...Show More Authors

This research id entitled "The Prohibition of Perfidy in International Humanitarian Law".  International humanitarian law includes some international agreements that aim to regulate hostilities, and the use of tools and means of warfare (The Hague Law), Where there are many international rules that govern the conduct and management of hostilities, there are some provisions that limit the use of certain means and methods during armed conflict, Whether by prohibiting the use of specific methods of fighting, or prohibiting or restricting the use of certain types of weapons, The dedication of these rules to the law of armed conflict comes in implementation of the principle of the law of war, which restricts the authorit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Efficient Single Stage Shrinkage Estimator for the Scale parameter of Inverted Gamma Distribution
...Show More Authors

 The present  paper agrees  with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using  suitable  shrinkage weight factor and region.  The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator  are performed .The results are presented in attached tables.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF